Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-50243: CWE-121: Stack-based Buffer Overflow in LevelOne WBR-6013

0
High
VulnerabilityCVE-2023-50243cvecve-2023-50243cwe-121
Published: Mon Jul 08 2024 (07/08/2024, 15:22:24 UTC)
Source: CVE Database V5
Vendor/Project: LevelOne
Product: WBR-6013

Description

Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `comment` request's parameter.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:21:01 UTC

Technical Analysis

CVE-2023-50243 identifies two stack-based buffer overflow vulnerabilities in the boa formIpQoS functionality embedded within the Realtek rtl819x Jungle SDK version 3.4.11. This SDK is used in the LevelOne WBR-6013 wireless router, specifically in firmware version RER4_A_v3411b_2T2R_LEV_09_170623. The vulnerability is triggered by specially crafted HTTP requests targeting the 'comment' parameter, which is improperly handled, leading to buffer overflow conditions on the stack. This flaw falls under CWE-121, indicating classic stack-based buffer overflow issues that can overwrite return addresses or control data on the stack. Exploiting this vulnerability allows an attacker to execute arbitrary code remotely with the privileges of the affected service, potentially leading to full device compromise. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require high privileges (PR:H) on the device, and no user interaction (UI:N) is needed. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No patches have been published yet, and no known exploits are reported in the wild, but the vulnerability poses a significant risk due to the potential for remote code execution on network infrastructure devices.

Potential Impact

For European organizations, the exploitation of CVE-2023-50243 could lead to severe consequences including unauthorized remote code execution on critical network devices, resulting in full compromise of the affected routers. This can lead to interception or manipulation of network traffic, disruption of network services, and potential lateral movement within organizational networks. Confidential data traversing these routers could be exposed or altered, undermining data integrity and privacy compliance obligations such as GDPR. The availability of network services could be impacted, causing operational downtime and affecting business continuity. Given that the vulnerability requires high privileges, attackers might need to first gain some level of access, but once exploited, the impact is extensive. European sectors with critical infrastructure, government networks, and enterprises relying on LevelOne WBR-6013 devices for wireless connectivity are particularly at risk.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any LevelOne WBR-6013 routers running the affected firmware version RER4_A_v3411b_2T2R_LEV_09_170623. Until a vendor patch is released, restrict access to the router’s management interfaces by implementing network segmentation and firewall rules that limit HTTP access to trusted administrative hosts only. Disable or restrict the boa web server functionality if possible, or replace the device with a more secure alternative. Monitor network traffic for unusual HTTP requests targeting the 'comment' parameter or other anomalies indicative of exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. Regularly check for vendor updates and apply patches promptly once available. Additionally, enforce strong authentication and privilege separation on network devices to reduce the risk of privilege escalation required for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-12-05T17:36:31.954Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5dff58c9332ff08ee4

Added to database: 11/4/2025, 5:43:57 PM

Last enriched: 11/4/2025, 6:21:01 PM

Last updated: 11/5/2025, 2:34:49 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats